Thursday, December 13, 2012

Making Access Control Easier -Using Your IP Network


Move over key, you may have been access control king for years, but today it’s swipe this, click that. Or in some cases, don’t do anything, just drive through the gate slowly – unless you’re approaching your garage door – then you have to push a button.
Last week’s blog entry took a look at the growth and evolution of access control as it applies to the work place; systems that involve swiping a badge or credential to a reader. These systems were dependent on a central control panel that used separate wiring bundles running out like octopus tentacles to each gate or door.

This week we talk about IP-based readers, an approach that dramatically decreases wiring since it uses the existing network infrastructure

IP Door Access control
IP readers, such as the Isonas PowerNet Reader, are super-intelligent in that they are reader and control panel all in one. IP reader-controllers connect to the network using TCP/IP protocol so they share it with computers, IP cameras, and PA over IP amplifiers.  A  Windows-based network computer running visitor management software, such as Crystal Matrix, keeps track of personnel authorized to enter specific doors and sends the lists to readers at those doors. It also compiles reports of entrants and their time of entry




Installation
IP door access control is easy to install since it uses the existing Ethernet. The reader contains control functions so no centralized panel is needed. Utilizing Cat5 or 6 cable, the standard network infrastructure, and a standard RJ5 connector means there’s no need to run wires, or install switches.  In fact since IP reader/controllers can run on power over the Internet (PoE), there’s not even a need for power wires. This means when additional readers are needed, they can be added to the network anywhere, anytime.



Credentials
Credentials are proximity devices, the equivalent of a key. Each credential is uniquely programmed with the individual’s identifying information and uses radio-frequency identification to communicate it to the reader controller. Since RFID uses radio-frequency electro-magnetic fields to transfer data, all a user has to do is present the credential a few inches in front of the controller and her part of the process is done.
Credentials are available in several forms to fit individual preferences.

Thin Card, the size of a credit card so it can fit in a wallet


Clam shell, thicker and stronger, pre-punched so it can be worn on a lanyard.

Key Fob, can attach to a key ring to be kept with user's other keys, built to withstand jostling.

Cap Tag, small round version with adhesive backing so it can be attached to other items, turning them into credentials



Software
Basic software, such as Crystal Matrix, installed on 
a Windows-running computer, allows an administrator to use a standard web browser to configure the reader-controller and define all access user rules. By adding E-web software you can use a web browser to control the system.

 This makes it simple for authorized personnel to use their passwords to access the reader controller from any Windows-running computer in order to make periodic changes  such as adding or subtracting users and updating schedules and holidays.  And when it’s time for weekly or monthly reports, each reader/controller can be accessed via the browser, and its stored events history downloaded.





We've looked at access control from the perspective of readers, credentials, and software, but what of the hardware? What devices are we locking or releasing. In our next entry we’ll look at electric strikes, magnetic locks and other hardware involved.


If you'd like information how IP-based access might work for you, call Kintronics at 800-431-1658 to speak to one of our sales engineers, or visit us at www.kintronics.com.

Wednesday, December 5, 2012

Making Access Control Easier For All Involved


Part 1

Here at Kintronics, our sales engineers aren't just experts in IP cameras, they are also thoroughly experienced in Access Control technology. I am neither a sales engineer nor have I had vast experience with its use. Despite many years in the workforce, I was employed at only one location with restricted access. It was a bank in California. What I liked about it was my photo on the badge. I wish I could have taken it with me when I left the position. What I didn't like was using it.

Each morning I’d rush into the lobby of the tall building. Since it housed several banks’ headquarters, security was high - for pre-9/11/2001. An armed guard sat at a desk in front of a wall made of heavy duty grating. The only entry was through either one of two revolving doors, though I’m not sure door is the correct word. Most revolving doors consist of intersecting panels of glass. These “panels” consisted of heavy steel bars jutting out from a vertical axis. Anyone who’s ever traveled in the New York City subway system is familiar with revolving doors of this type. They serve as one-way exits out of the stations.



The difference between the subway exit and my bank’s entry is that in the subway you just step into a section, push the wall of bars and follow them around as the door revolves. At the bank building, the only way to get them to revolve was to touch your ID pass to a metal plate to the right of the door Notice I didn't say swipe your pass. I said touch. It was a touch I never quite got the hang of. The front of the card had to match up vertically, just so, to the reader –like your photo was playing kissy face with the panel. 

Problem was my kiss never quite landed on the right spot. I’d line it up:
Smack   That didn't work.
Bam   Neither did that.
 Whoosh   Nope

 It usually took at least three tries before I heard the reassuring clunk on the door that translated into OK I’m open but hurry up. You have ten seconds. But that didn't mean I was in. I think all the pressure got to me, paralyzed me, hindered my brain-to-hand coordination, because on more than one occasion, by the time I pushed the bars they pushed back. Clunk - Out of time!! Back to the reader!



Need I point out, I wasn't the only one trying to get to work in time to punch in?  My travails didn't make me the person other employees wanted to see ahead of them. At this point, the armed guard sitting there, shaking his head, would come over, take my badge,  tap it lightly to the reader, then hand it back to me with the command - 
Now!

Since that was nearly twenty years ago, I’m sure the bank has upgraded their access control system many times. For in that time, the access control reader has gotten a lot smarter, even if a certain one of its former users hasn't.

The Evolution of Door Access Control

Basic non-intelligent reader

The system I described used a basic non-intelligent reader panel that was wired to a central control panel. All access requests were sent from the reader to the central control. The central control panel was in turn wired to a lock control panel on the door that, in turn, released the locking mechanism when satisfactory credentials were read.


Semi-intelligent reader
Improvements to access control increased the intelligence placed at the reader near the door, and reduced the trail of wires a bit. The reader could now control the door lock hardware, doing away with the need for a lock control panel at the door, but it couldn't make any decisions. It still had to pass the code on the credential to the central control panel and wait for a response. These readers were usually connected to the main panel by a RS-485 bus.



Intelligent reader  

Intelligent readers connected back to the central control panel via the same type RS-485 connection mentioned above, but they contained enough memory and intelligence to make access decisions independent of it. In these systems the central control panel served in an administrative capacity, if you will, providing configuration updates and maintaining a history of door access events received from the readers.



Intelligent IP reader and controller

Readers, such as those made by Isonas, are IP readers, meaning they are network attached. They use a Cat 5 or 6 cable, the standard network infrastructure for communication. Like all intelligent readers, it makes the decision whether or not to grant access. But access control software, running in a Windows computer has done away with the control panel.


Blue Tooth Reader
Blue Tooth readers such as those made by ECKey allow the use of a smart phone instead of a badge.  Authorized personnel can unlock a door or gate using a smartphone and ECKey.

 There are two variations:

  • In facilities with high security concerns and an existing access control system in place, a Bluetooth adapter is added to the existing reader. Once an employee syncs her smartphone to the reader she can use the phone to gain access.


  • There is also a standalone reader available for facilities with more relaxed security, and no existing control system. An ECKey reader is attached to the lock and once an employee has synced her Smartphone to the ECKey reader she can gain access to that particular entrance.



Wow! That sounds so easy even I could do it – if only I had a Smartphone.
Our next couple of blog entries will explore some of these systems in more detail.

Meanwhile, if you are looking for an IP reader system or a Bluetooth system you can come to www.kintronics.com  for information or call us at 800-431-1658 to speak to one of our sales engineers.